590 research outputs found

    A Light-Weight Real-Time Privacy Protection Scheme for Video Surveillance by Unmanned Aircraft Systems

    Full text link
    Unmanned Aircraft Systems (UAS)have raised a great concern on privacy recently. A practical method to protect privacy is needed for adopting UAS in civilian airspace. This thesis examines the privacy policies, filtering strategies, existing techniques, then proposes a new method based on encrypted video stream and cloud-based privacy servers. In this scheme, all video surveillance images are initially encrypted, then delivered to a privacy server. The privacy server decrypts the video using the shared key with the camera, and filters the image according to the privacy policy specified for the surveyed region. The sanitized video is delivered to the surveillance operator and anyone on the Internet who is authorized. In a larger system composed of multiple cameras and multiple privacy servers, the keys can be distributed using Kerberos protocol. With this method the privacy policy can be changed on demand in real-time and there is no need for a costly on-board processing unit. By utilizing cloud-based servers, advanced image processing algorithms and new filtering algorithms, this method can be applied immediately without camera software upgrade. This method is cost-efficient and promotes video sharing among multiple subscribers, thus it can spur wider adoption

    From My Kitchen Window: Reflections and Essays of a Border Crisis

    Get PDF
    Memories and encounters of a life long border resident during the ongoing immigration crisis experienced in the Rio Grande Valley from 2017-2020. Thesis includes published essays that featuring interviews with migrants at the Catholic Charities of the Rio Grande Valley Humanitarian Respite Center

    Privacy-invading technologies : safeguarding privacy, liberty & security in the 21st century

    Get PDF
    With a focus on the growing development and deployment of the latest technologies that threaten privacy, the PhD dissertation argues that the US and UK legal frameworks, in their present form, are inadequate to defend privacy and other civil liberties against the intrusive capabilities of body scanners, CCTV microphones and loudspeakers, human-implantable microchips, and other privacy-intrusive technologies. While there are benefits derived from the use of these technologies in terms of public security, for instance, these benefits do not necessarily need to come at the expense of privacy and liberty overall. The interests of privacy, liberty and security can be balanced and safeguarded concurrently. In order to accomplish this worthy objective, new laws must further regulate directly and proactively the design and manufacture of these privacy-intrusive technologies in the first place, rather than only regulate their use or operation. Manufacturer-level rules/regulations should, therefore, require the incorporation of the fundamental privacy principles through what is known as __Privacy by Design__.LEI Universiteit LeidenEffective Protection of Fundamental Rights in a pluralist worl

    (Dis)Obedience in Digital Societies: Perspectives on the Power of Algorithms and Data

    Get PDF
    Algorithms are not to be regarded as a technical structure but as a social phenomenon - they embed themselves, currently still very subtle, into our political and social system. Algorithms shape human behavior on various levels: they influence not only the aesthetic reception of the world but also the well-being and social interaction of their users. They act and intervene in a political and social context. As algorithms influence individual behavior in these social and political situations, their power should be the subject of critical discourse - or even lead to active disobedience and to the need for appropriate tools and methods which can be used to break the algorithmic power

    (Dis)Obedience in Digital Societies

    Get PDF
    Algorithms are not to be regarded as a technical structure but as a social phenomenon - they embed themselves, currently still very subtle, into our political and social system. Algorithms shape human behavior on various levels: they influence not only the aesthetic reception of the world but also the well-being and social interaction of their users. They act and intervene in a political and social context. As algorithms influence individual behavior in these social and political situations, their power should be the subject of critical discourse - or even lead to active disobedience and to the need for appropriate tools and methods which can be used to break the algorithmic power

    Military applications of geological engineering

    Get PDF
    This work examines the premise that military engineering and geological engineering are intellectually paired and overlapped in practice to a significant extent. Geological engineering is an established, albeit young, academic discipline that enjoys wide industry and civil demand and is supported by many professional organizations. In contrast, military engineering is an ancient, empirically derived training or OJT program with practice-based trade-associations that has narrow government-only utility. The premise is formed by decades-long observation of U. S. Army military engineer officers completing a Master of Science degree in geological engineering as a complement to their practice-based training in military engineering at the Captains Career Course of the U.S. Army Engineer School. Almost everywhere has some existing data on the local geology for civil purposes, yet these are ignored, not accessible or not translated to military purposes. A description of the intersection between military and geological engineering is followed by comparison the practice of the geological and military engineer. Research and intellectual development is projected to fill current gaps in military considerations by geological engineers. Finally, steps to share these concepts and convince military engineers to adopt and extend the geological underpinnings of their profession are outlined. This work serves both a personal and professional interest. Previous personal work at the intersection of military scholarship and engineering underlie this premise --Abstract, page iv

    Mobile Robots Navigation

    Get PDF
    Mobile robots navigation includes different interrelated activities: (i) perception, as obtaining and interpreting sensory information; (ii) exploration, as the strategy that guides the robot to select the next direction to go; (iii) mapping, involving the construction of a spatial representation by using the sensory information perceived; (iv) localization, as the strategy to estimate the robot position within the spatial map; (v) path planning, as the strategy to find a path towards a goal location being optimal or not; and (vi) path execution, where motor actions are determined and adapted to environmental changes. The book addresses those activities by integrating results from the research work of several authors all over the world. Research cases are documented in 32 chapters organized within 7 categories next described
    • …
    corecore